• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Protecting management information systems: Virtual Private Network competitive advantage

Sirisukha, Sid Unknown Date (has links)
Information security technologists and business scholars are motivated by a desire to understand how and to what extent the application of IT within enterprise systems leads to improved and secured organizational performance. An effective relationship between business and IT professionals is a primary determinant of success in gaining business advantage through the enterprise system. As business innovation has relied increasingly on partnerships between business and IT professional, a different perspective of how IT professionals view their organizational contributions was needed for organizations to remain competitive. Business knowledge is essential if IT professionals are to create linkages with other organizational units and have a wider perspective about business objectives, thus achieving fit between IT and organizational strategies. Organizations have started responding to this challenge by demanding more business acumen in their IT staff. The focus of this study is on the knowledge that is beyond that of independent business and IT only domain knowledge of information security. Therefore, technical areas of knowledge, such as hardware and software, all of which are closely associated with IT skills, are not discussed in this thesis. This is not to declare that such knowledge is not important. Clearly technical knowledge is part of the IT professional's overall information security technology expertise, but this study is about the organization proficiency of business and the IT professional, and is therefore interested in what enables business and IT professionals to apply their business domain and technical knowledge in ways that are beneficial to the organization and to act cooperatively with their customers and business partners. The purpose of this study is to employ the triangulation method to identify the theoretical links and empirically examine the association between business and IT perspective of information security. An important contribution of this study is the identification of business and IT perspectives on information security technology. By establishing the link between business and IT, the study focuses and evaluates Virtual Private Network (VPN) as an information security technology to find out if VPN can secure and gain competitive advantage by partisan business process and organization performance. This study articulates distinctive characteristics of Virtual Private Network and management processes that extend the range of applicability across diverse business segments. It distinguishes between business and IT and explains why the exploitation of a complementary set of related information security entities (such as VPN) across multiple functions create competitive vi advantages even across a diverse set of businesses that have limited opportunity to exploit business process and organization performance. The most important direct predictor of this study is a high level of communication between business and IT. However, one cannot mandate meaningful communication between individuals. IT people have to earn the right to play a meaningful role in management forums. Based on the findings from this study, one important way for an IT person to be heard is for him/her to devote the time necessary to create competitive advantage and develop shared domain knowledge, the most influential construct in the research model. An IT person needs to understand the leverage points of the industry, the history and current issues of the business units, and to learn to apply business oriented objectives in the application of technology to business problems. This change in view would help focus their attention on security technology and ideas that could produce the most benefit and create competitive advantage, rather than those that offer the most technical promise.
2

Protecting management information systems: Virtual Private Network competitive advantage

Sirisukha, Sid Unknown Date (has links)
Information security technologists and business scholars are motivated by a desire to understand how and to what extent the application of IT within enterprise systems leads to improved and secured organizational performance. An effective relationship between business and IT professionals is a primary determinant of success in gaining business advantage through the enterprise system. As business innovation has relied increasingly on partnerships between business and IT professional, a different perspective of how IT professionals view their organizational contributions was needed for organizations to remain competitive. Business knowledge is essential if IT professionals are to create linkages with other organizational units and have a wider perspective about business objectives, thus achieving fit between IT and organizational strategies. Organizations have started responding to this challenge by demanding more business acumen in their IT staff. The focus of this study is on the knowledge that is beyond that of independent business and IT only domain knowledge of information security. Therefore, technical areas of knowledge, such as hardware and software, all of which are closely associated with IT skills, are not discussed in this thesis. This is not to declare that such knowledge is not important. Clearly technical knowledge is part of the IT professional's overall information security technology expertise, but this study is about the organization proficiency of business and the IT professional, and is therefore interested in what enables business and IT professionals to apply their business domain and technical knowledge in ways that are beneficial to the organization and to act cooperatively with their customers and business partners. The purpose of this study is to employ the triangulation method to identify the theoretical links and empirically examine the association between business and IT perspective of information security. An important contribution of this study is the identification of business and IT perspectives on information security technology. By establishing the link between business and IT, the study focuses and evaluates Virtual Private Network (VPN) as an information security technology to find out if VPN can secure and gain competitive advantage by partisan business process and organization performance. This study articulates distinctive characteristics of Virtual Private Network and management processes that extend the range of applicability across diverse business segments. It distinguishes between business and IT and explains why the exploitation of a complementary set of related information security entities (such as VPN) across multiple functions create competitive vi advantages even across a diverse set of businesses that have limited opportunity to exploit business process and organization performance. The most important direct predictor of this study is a high level of communication between business and IT. However, one cannot mandate meaningful communication between individuals. IT people have to earn the right to play a meaningful role in management forums. Based on the findings from this study, one important way for an IT person to be heard is for him/her to devote the time necessary to create competitive advantage and develop shared domain knowledge, the most influential construct in the research model. An IT person needs to understand the leverage points of the industry, the history and current issues of the business units, and to learn to apply business oriented objectives in the application of technology to business problems. This change in view would help focus their attention on security technology and ideas that could produce the most benefit and create competitive advantage, rather than those that offer the most technical promise.
3

Translating Sensory Perceptions: Existing and Emerging Methods of Collecting and Analyzing Flavor Data

Hamilton, Leah Marie 28 April 2022 (has links)
Food flavor is hugely important in motivating food choice and eating behavior. Unfortunately for research and communication about flavor, many languages' flavor vocabularies are notoriously variable and must be aligned before data collection using training or after the fact by researchers. This dissertation demonstrates one example of each approach (conventional descriptive analysis (DA) and labeled free sorting, respectively), and compares their use to emerging, computational natural language processing (NLP) methods that use large volumes of existing text data. Rapid methods that align flavor vocabulary after data collection are most similar to NLP, and with the development or improvement of some strategic tools, NLP is well-poised to further accelerate the analysis of existing text data or unaligned vocabularies. DA, while much more time-consuming, ensures that the researchers, tasters, and readers have a shared definition of any flavor words used, an advantage that all existing rapid methods lack. With a greater understanding of how this differs from everyday communication about flavor, future researchers may be able to replicate this aspect of DA in novel descriptive methods. This dissertation investigates the flavors of specialty beverages, specifically American whiskeys and cold brew coffees. American whiskeys differ from other whiskeys based on raw materials and aging practices, with the aging practices primarily setting them apart. While the most expensive American whiskeys are similar to Scotches and dominated by oaky, sultana-like flavors, only very rich consumers desire these flavors, with chocolate and caramel being the most widely preferred by most consumers. Degree of roasting has more of an impact on cold brew coffee flavor than the origin of the beans, and the coffee consumers surveyed here preferred dark roast to light roast cold brews. / Doctor of Philosophy / Food flavor is hugely important in motivating food choice and eating behavior. Unfortunately for research and communication about flavor, many languages' flavor vocabularies are notoriously inconsistent: flavor words may have more than one meaning, multiple words may mean the same thing, and people regularly make mistakes when naming flavors. To get around this, researchers can either train human tasters to use a fixed set of flavor words, or they can attempt to identify the flavors that people are talking about from their own-words descriptions. In this dissertation, I give examples of both of these methods and compare them to approaches based on machine learning and other computational techniques. This dissertation investigates the flavors of specialty beverages, specifically American whiskeys and cold brew coffees. American whiskeys differ from other whiskeys based on raw materials and aging practices, with the aging practices primarily setting them apart. Producers wanting to set their whiskeys apart with the use of specialty or heritage grains will likely need to work with breeders to develop new varieties that will impart special flavors to the whiskeys. While the most expensive American whiskeys are similar to Scotches and dominated by oaky, sultana-like flavors, only very rich consumers desire these flavors, with chocolate and caramel being the most widely preferred by most consumers. For cold brew coffees, degree of roasting has more of an impact on flavor than the origin of the beans, although a subset of people sense and prioritize origin-related flavor differences when making flavor groups. The coffee consumers surveyed here preferred dark roast to light roast cold brews, which suggests that different beans are ideal for making well-liked cold brew coffee than traditional hot brew.

Page generated in 0.0702 seconds